Title | : | Ensuring collusion resistance in cloud storage applications while sharing encrypted data |
Speaker | : | Arinjita Paul (IITM) |
Details | : | Thu, 29 Nov, 2018 12:30 PM @ A M Turing Hall |
Abstract: | : | Cloud storage enables its users to store confidential information as encrypted data. A cloud user (say Alice) can share her encrypted files with another user (say Bob) by availing proxy re-encryption services of the cloud. Proxy Re-Encryption (PRE) is a cryptographic primitive that allows transformation of ciphertexts from Alice to Bob via a semi-trusted proxy, who should not learn anything about the shared message or the private keys of the users. Typically, the re-encryption rights are enabled only for a bounded, fixed time and malicious parties may want to decrypt or learn messages encrypted for Alice, even beyond that time. The basic security notion of PRE assumes the proxy (cloud) is semi-trusted, which is seemingly insufficient in practical applications. The proxy may want to collude with Bob to obtain the private keys of Alice for later use. Such an attack is called collusion attack, allowing colluders to illegally access all encrypted information of Alice in the cloud. Hence, achieving collusion resistance is indispensable to real-world scenarios. Realizing collusion-resistant PRE has been an interesting problem in the identity based setting. To this end, several attempts have been made to construct a collusion-resistant IB-PRE scheme, but they do not adhere to the standard definition of PRE.
We present a new collusion-resistant IB-PRE scheme that meets the adaptive CCA security under the decisional bilinear Diffie-Hellman hardness assumption in the random oracle model. To the best of our knowledge, this gives the first provably secure collusion resistant PRE scheme in the identity-based setting. |